I assume it's so torcheck can help you with your application-level privacy decisions too.
I think our best bet here, if we want to do it, is to identify our favorite such page and include a link. But I'm not sure that's needed.
More generally, if we were to do anything about application-level privacy on check, I'd want to do a Torbutton detector, so it can yell at you if you show up using Iceweasel or IE or the like. I think such a detector is designed to be hard to make you 100% accurate, but we could still get pretty good by just comparing user-agent with the user-agents in currently-recommended TBBs.
Yes, it would be better, if torcheck shows alert message if useragent contains uncommon information such as nightly build, or non-standard user-agent.
I created this proposal after I'd used orweb from my smartphone. This browser has issue with user-agent by default, using default's browser user-agent string. This string contains sensitive information, such as os information, nightly build information and so on. I understand, that it is bug in orweb, but we can warn tor users if they meet this problem.
Also, you can look at http://panopticlick.eff.org.
Yes, it would be better, if torcheck shows alert message if useragent contains uncommon information such as nightly build, or non-standard user-agent.
I created this proposal after I'd used orweb from my smartphone. This browser has issue with user-agent by default, using default's browser user-agent string. This string contains sensitive information, such as os information, nightly build information and so on. I understand, that it is bug in orweb, but we can warn tor users if they meet this problem.
I don't think there's a good reason why Tor should branch out into maintaining one of these pages. Perhaps we should find our favorite page that somebody else maintains, and point to that?
More generally, if we were to do anything about application-level privacy on check, I'd want to do a Torbutton detector, so it can yell at you if you show up using Iceweasel or IE or the like. I think such a detector is designed to be hard to make you 100% accurate, but we could still get pretty good by just comparing user-agent with the user-agents in currently-recommended TBBs.
In #1940 (moved) you seemed to be saying wontfix. We can do something very coarse grained like,
if (!(/Firefox/gi).test(window.navigator.userAgent)) yell!
Users are configuring their Safari/IE browser to proxy through Tor, then visit check.tpo and see a happy message that they are using Tor successfully. Even if a user agent check wouldn't detect everyone who did this, getting a warning message to some people would help deter this behavior.
I don't think there is a good way of noticing the difference between someone using their browser's proxy settings and some using a Tor router. I'm not sure if we care about this difference or not.
This approach means we're going to have false positives when TBB moves to the next Firefox ESR, and eventually somebody will open a ticket, and eventually we'll update it, and then we do the cycle again on the next ESR?
Maybe a regexp to handle the upcoming expected ESRs will avoid this cycle?
This approach means we're going to have false positives when TBB moves to the next Firefox ESR, and eventually somebody will open a ticket, and eventually we'll update it, and then we do the cycle again on the next ESR?
Maybe a regexp to handle the upcoming expected ESRs will avoid this cycle?
I think in the flashproxy case a wrong classification is ok, since it just causes you to try to be a flashproxy even though it won't work very well. But in this case thinking you're not Tor when you are will result in a misleading warning to the user. So I think they are different situations. Do you buy it?